nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A novel asymmetric three-party based authentication scheme in wearable devices environment
|
Liu, Sha |
|
2016 |
60 |
C |
p. 144-154 11 p. |
artikel |
2 |
Applications of wireless sensor networks for urban areas: A survey
|
Rashid, Bushra |
|
2016 |
60 |
C |
p. 192-219 28 p. |
artikel |
3 |
A survey of grid-based searching techniques for large scale distributed data
|
Bakri Bashir, Mohammed |
|
2016 |
60 |
C |
p. 170-179 10 p. |
artikel |
4 |
A survey of network anomaly detection techniques
|
Ahmed, Mohiuddin |
|
2016 |
60 |
C |
p. 19-31 13 p. |
artikel |
5 |
A survey on mobility-assisted localization techniques in wireless sensor networks
|
Halder, Subir |
|
2016 |
60 |
C |
p. 82-94 13 p. |
artikel |
6 |
Availability in the cloud: State of the art
|
Nabi, Mina |
|
2016 |
60 |
C |
p. 54-67 14 p. |
artikel |
7 |
Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general purpose computer
|
Silva, Natassya B.F. |
|
2016 |
60 |
C |
p. 130-143 14 p. |
artikel |
8 |
Comparison-based system-level fault diagnosis protocols for mobile ad-hoc networks: A survey
|
Jarrah, Hazim |
|
2016 |
60 |
C |
p. 68-81 14 p. |
artikel |
9 |
Differentiated forwarding and caching in named-data networking
|
Kim, Yusung |
|
2016 |
60 |
C |
p. 155-169 15 p. |
artikel |
10 |
Editorial
|
Atiquzzaman, Mohammed |
|
2016 |
60 |
C |
p. A1-A3 nvt p. |
artikel |
11 |
Editorial board
|
|
|
2016 |
60 |
C |
p. IFC- 1 p. |
artikel |
12 |
I2CC: Interleaving two-level cache with network coding in peer-to-peer VoD system
|
Kao, Hui-Hsiang |
|
2016 |
60 |
C |
p. 180-191 12 p. |
artikel |
13 |
RESTful service composition at a glance: A survey
|
Garriga, Martin |
|
2016 |
60 |
C |
p. 32-53 22 p. |
artikel |
14 |
Review and analysis of networking challenges in cloud computing
|
Moura, Jose |
|
2016 |
60 |
C |
p. 113-129 17 p. |
artikel |
15 |
Traffic matrix estimation: A neural network approach with extended input and expectation maximization iteration
|
Zhou, Haifeng |
|
2016 |
60 |
C |
p. 220-232 13 p. |
artikel |
16 |
Trustworthy and effective person-to-person payments over multi-hop MANETs
|
Carminati, Barbara |
|
2016 |
60 |
C |
p. 1-18 18 p. |
artikel |
17 |
Web application protection techniques: A taxonomy
|
Prokhorenko, Victor |
|
2016 |
60 |
C |
p. 95-112 18 p. |
artikel |